Home
 » ISP News » 
Sponsored Links

NETGEAR Broadband Routers Exposed to New Security Bug

Wednesday, Sep 22nd, 2021 (8:31 am) - Score 912
netgear nighthark r7000

A large number of NETGEARs broadband and WiFi routers have been left vulnerable to a new Remote Code Execution (RCE) exploit, which works by allowing a hacker to manipulate the update process for each device’s Circle Smart Parental Control Service in order to gain control of the router.

The parental control service itself is NOT enabled by default on the company’s routers, but this doesn’t mean that owners who don’t use it are safe because the Circle update daemon itself is enabled by default. This daemon connects to Circle and Netgear to obtain updates for its filtering database, but NETGEAR sends those updates out as unsigned and via an unencrypted HTTP transfer.

NOTE: The vulnerability has been given the designation CVE-2021-40847.

In this case, a Man in the Middle (MitM) style attack was developed that can respond to circled update requests with a specially-crafted, compressed database file, the extraction of which gives the attacker the ability to overwrite executable files with attacker-controlled code (i.e. they can gain root access to the router).

Advertisement

A Proof of Concept (PoC) attack for this was developed for and tested against the Netgear R7000 router by GRIMM, but the issue also impacts other models including the R6400v2, R6700, R6700v3, R6900, R6900P, R7000P, R7850, R7900, R8000 and RS400. However, an attacker would need to be connected to a network with one of these routers installed, either locally or via a remote connection, in order to carry out the hack.

The good news is that NETGEAR have already released a new firmware patch for the affected models (Credits to Steve for spotting this), while GRIMM recommends the provisioning and use of Virtual Private Network (VPN) clients for those who can’t yet patch (these should be configured to handle all traffic to ensure that an attacker cannot read or modify network traffic in a way that cannot be detected by the VPN endpoints).

Share with Twitter
Share with Linkedin
Share with Facebook
Share with Reddit
Share with Pinterest
Mark-Jackson
By Mark Jackson
Mark is a professional technology writer, IT consultant and computer engineer from Dorset (England), he also founded ISPreview in 1999 and enjoys analysing the latest telecoms and broadband developments. Find me on X (Twitter), Mastodon, Facebook, BlueSky, Threads.net and .
Search ISP News
Search ISP Listings
Search ISP Reviews

Comments are closed

Cheap BIG ISPs for 100Mbps+
Community Fibre UK ISP Logo
100Mbps
Gift: None
Vodafone UK ISP Logo
Vodafone £22.00
150Mbps
Gift: None
Virgin Media UK ISP Logo
Virgin Media £23.99
264Mbps
Gift: None
Plusnet UK ISP Logo
Plusnet £24.99
145Mbps
Gift: £145 Reward Card
Youfibre UK ISP Logo
Youfibre £24.99
200Mbps
Gift: None
Large Availability | View All
Promotion
Cheap Unlimited Mobile SIMs
iD Mobile UK ISP Logo
iD Mobile £16.00
Contract: 24 Months
Data: Unlimited
Talkmobile UK ISP Logo
Talkmobile £16.95
Contract: 1 Month
Data: Unlimited
ASDA Mobile UK ISP Logo
ASDA Mobile £19.00
Contract: 24 Months
Data: Unlimited
Smarty UK ISP Logo
Smarty £20.00
Contract: 1 Month
Data: Unlimited
O2 UK ISP Logo
O2 £21.24
Contract: 24 Months
Data: Unlimited
Cheapest ISPs for 100Mbps+
Gigaclear UK ISP Logo
Gigaclear £17.00
200Mbps
Gift: None
Community Fibre UK ISP Logo
100Mbps
Gift: None
toob UK ISP Logo
toob £19.50
150Mbps
Gift: None
Vodafone UK ISP Logo
Vodafone £22.00
150Mbps
Gift: None
Beebu UK ISP Logo
Beebu £23.00
100 - 160Mbps
Gift: None
Large Availability | View All
Promotion
Sponsored

Copyright © 1999 to Present - ISPreview.co.uk - All Rights Reserved - Terms , Privacy and Cookie Policy , Links , Website Rules , Contact